透過您的圖書館登入
IP:3.14.83.223
  • 學位論文

無線網路認證機制之研究

A Study of Wireless Network Authentication Schemes

指導教授 : 詹昭文
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


近年來,無線網路成為一股趨勢,越來越多的公共場所,如旅館、機場、圖書館,甚至便利商店都提供無線網路的服務。使用者透過無線網路存取所需的服務。有些網路服務只有合法者可以存取。而無線網路的特性為廣播媒體,使得非法使用者容易透過此廣播媒體竊取合法使用者個人資料,偽裝成合法使用者存取網路服務。所以我們需要一個有效可靠的身份確認機制。本研究主要針對無線網路身份確認機制提出二個方法,一個僅使用安全單向雜湊函式,來達到無線網路身份確認機制,另一個是基於公開金鑰密碼學,亦可達到無線網路身份確認機制。在2003年,Chien和Jan兩位學者提出了一個混合式的無線網路身份確認機制,這機制包含二個子機制,一個為註冊網域身份確認機制,一個為非註冊網域身份確認機制,我們將以我們的二種方法來改進2003年 Chien 和 Jan 所提出的混合式無線網路身份確認機制的弱點。

並列摘要


Recently, the technology of wireless networks has become popular. More and more public places, such as hotels, airports, libraries, and even convenient stores establish many wireless network access points to provide people to access the services in Internet. Users need to be authenticated with remote servers before they can access the requested services provided by the servers. However, wireless networks are broadcasting medium that anyone can eavesdrop or modify the message on the medium. An attacker therefore can learn or cheat the private information of a legal user from the medium if we provide no protection of the message on the medium. Without protection, an attacker can impersonate successfully another legal user to access the network services in a very high probability. Therefore, we need a reliable and effective identity authentication scheme to prevent the impersonating attack. In this study, we propose two security wireless networks identity authentication schemes, one is an encrypted-nonce-with-hash-based schemes, the other is an encrypted-nonce-with-public-key-based Schemes. In 2003, Chien and Jan proposed an identity authentication scheme for hybrid networking environments. The scheme consisted of two subschemes; an intra-domain authentication subscheme, and an inter-domain authentication subscheme. Our proposed schemes can correct their security problem.

參考文獻


[10] Q. T. Qiang and J. C. Chris, “Cryptanalysis of a hybrid authentication protocol for large mobile network,” Journal of Systems and Software, Vol. 79, Issue 4, 2006, pp. 496-501.
[2] C. C. Yang, Y. L. Tang, R. C. Wang, and H. W. Yang, “A secure and efficient authentication protocol for anonymous channel in wireless communications,” Applied Mathematics and Computation, Vol. 169, Issue 2, 2005, pp. 1431-1439.
[4] H. Y. Chien and J. K. Jan, “A hybrid authentication protocol for large mobile network,” Journal of Systems and Software, Vol. 67, Issue 2, 2003, pp. 123-137.
[5] I. L. Kao and R. Chow, “An efficient and secure authentication protocol using uncertified keys,” ACM Operating Systems Review, Vol. 29, Issue 3, 1995, pp.14-21.
[6] J. Kohl and C. Neuman, “The Kerberos network authentication service (V5),” Internet Request for Comments, 1993.

延伸閱讀